Wednesday, September 21. 2011

Friday, November 12. 2010

I came across the following issues and solutions while working with macosx:

1. Failed to login either without further message or some FileVault error
$HOME may still be mounted. see mount, then unmount your home dir, e.g.hdiutil unmount /Users/test
See also Best Practices for Using FileVault.

2. Resolve intranet hostnames via VPN
Suppose foo.bar is the internal domain name on the other side of a VPN connection. And hosts under foo.bar can not be resolved by the default name server. Then, without changing the DNS configuration globally, there is a rather elegant solution within the mac's name resolver:

$ cat /etc/resolver/foo.bar
nameserver 10.0.0.1

See $ man 5 resolver for further details.

3. GPGMail Key pre-selectionGPGMail, _the_ one must-have Plugin for Mail.app, selects keys for encryption automatically, based on the recipient's email address. If either this email address is not listed under the appropriate key (see gpg --list-keys), or the receiver is a mailing list with several subscribers, the automatic key preselection fails.
That is, unless groups have been created in ~/.gnupg/gpg.conf like so:group everybody@foo.bar = 0x12345678 0xABCDEF12 0x00000001
See also: $ info gpg

Tuesday, June 1. 2010

Abstract
Both PHP and JavaScript are frequently being targeted for exploiting web applications. This article elaborates on the idea of building a set of virtual machines on top of each programming language. As a result a single type of bytecode can be executed by both VMs. Particular emphasis is put on designing virtual machines to be most suitable for code obfuscation in a post exploitation scenario.

Tuesday, March 23. 2010

It's just one of those spring days where your may wonder how to control your friendly BlinkenLights neighbourhood building with Asterisk. Ordinarily the installation comes with a control program called BlinkenLights Chaos Control Center (BLCCC) which can be seen as a jukebox controller handling movies and games. The BLCCC expects incoming ISDN phone calls to be relayed by a UDP based protocol. A suitable Asterisk AGI application can now take over the role of a mediator between ISDN and BLCCC, thus transparently substitute a real ISDN line.